Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics
Image from Google Jackets
Image from OpenLibrary

Security in computing / Charles P. Pfleeger.

By: Material type: TextTextPublication details: Upper Saddle River, NJ : Prentice Hall PTR, c2003.Edition: 3rd edDescription: xvii,746 p. : ill. ; 24 cmISBN:
  • 0131201999
  • 9780131201996
Subject(s): DDC classification:
  • 005.8 20
LOC classification:
  • QA76.9.A25 P45 2003
Contents:
Is there a security problem in computing? -- Elementary cryptography -- Program security -- Protection in general-purpose operating systems -- Designing trusted operating systems -- Database security -- Security in networks -- Administering security -- Legal,privacy, and ethical issues in computer security -- Cryptography explained.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Zetech Library - TRC General Stacks Non-fiction QA76.9. A25 P45 2003 (Browse shelf(Opens below)) Available Z005412
Books Books Zetech Library - TRC General Stacks Non-fiction QA76.9. A25 P45 2003 (Browse shelf(Opens below)) C.1 Available Z006537
Books Books Zetech Library - TRC General Stacks Non-fiction QA76.9. A25 P45 2003 (Browse shelf(Opens below)) C.1 Checked out 03/10/2024 Z006461
Browsing Zetech Library - TRC shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
QA76.9. A25 P45 1997 Security in computing / QA76.9. A25 P45 2003 Security in computing / QA76.9. A25 P45 2003 Security in computing / QA76.9. A25 P45 2003 Security in computing / QA76.9.A25P57 2000 Information security : protecting the global enterprise / QA76.9.A25P57 2000 Information security : protecting the global enterprise / QA76.9.A25P57 2000 Information security : protecting the global enterprise /

Includes bibliographical references (p. 537-559) and index.

Is there a security problem in computing? -- Elementary cryptography -- Program security -- Protection in general-purpose operating systems -- Designing trusted operating systems -- Database security -- Security in networks -- Administering security -- Legal,privacy, and ethical issues in computer security -- Cryptography explained.

There are no comments on this title.

to post a comment.